New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

1D0-571 Questions and Answers

Question # 6

A new server has been placed on the network. You have been assigned to protect this server using a packet-filtering firewall. To comply with this request, you have enabled the following ruleset:

Which choice describes the next step to take now that this ruleset has been enabled?

A.

From the internal network, use your Web browser to determine whether all internal users can access the Web server.

B.

From the internal network, use your e-mail client to determine whether all internal users can access the e-mail server.

C.

From the external network, use your Web browser to determine whether all external users can access the Web server.

D.

From the external network, use your e-mail client to determine whether all external users can access the e-mail server.

Full Access
Question # 7

At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange (IKE)?

A.

Determining the number of security associations

B.

Negotiating the authentication method

C.

Determining the network identification number

D.

Negotiating the version of IP to be used

Full Access
Question # 8

Consider the following image of a packet capture:

This packet capture has recorded two types of attacks. Which choice lists both attack types?

A.

A dictionary attack and a worm-based attackA.A dictionary attack and a worm-based attack

B.

A syn flood attack and a spoofing attackB.A syn flood attack and a spoofing attack

C.

A worm attack and a botnet attack C.A worm attack and a botnet attack

D.

A SQL injection attack and a virus attackD.A SQL injection attack and a virus attack

Full Access
Question # 9

Which of the following is a primary auditing activity?

A.

Encrypting data files

B.

Changing login accounts

C.

Checking log files

D.

Configuring the firewall

Full Access